Sciweavers

82 search results - page 12 / 17
» Inductive Proofs of Computational Secrecy
Sort
View
EUROCRYPT
1999
Springer
14 years 25 days ago
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Distributed key generation is a main component of threshold cryptosystems and distributed cryptographic computing in general. Solutions to the distributed generation of private key...
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk,...
BIRTHDAY
2006
Springer
14 years 9 days ago
Proving Behavioral Refinements of COL-specifications
The COL institution (constructor-based observational logic) has been introduced as a formal framework to specify both generationand observation-oriented properties of software syst...
Michel Bidoit, Rolf Hennicker
BIRTHDAY
2006
Springer
14 years 9 days ago
Eliminating Dependent Pattern Matching
Abstract. This paper gives a reduction-preserving translation from Coquand's dependent pattern matching [4] into a traditional type theory [11] with universes, inductive types...
Healfdene Goguen, Conor McBride, James McKinna
EXACT
2008
13 years 11 months ago
Towards Reasoning and Explanations for Social Tagging
This paper describes a project aiming at enhancing social tagging with reasoning and explanations. So as to keep with the ease of use characteristic of social media, simple explana...
François Bry, Jakub Kotowski
LATA
2009
Springer
14 years 3 months ago
Termination of Priority Rewriting
Introducing priorities on rules in rewriting increases their expressive power and helps to limit computations. Priority rewriting is used in rule-based programming as well as in f...
Isabelle Gnaedig